Showing documents 6 to 10  Previous  Next

Results per page: 5 | 10 | 20


cover image

IBM Power Systems S922, S914, and S924 Introduction and Technical Overview
Power Systems

Draft Redpaper, last updated 21 Jun 2018

This IBM® Redpaper™ publication is a comprehensive guide that covers the IBM Power System S922 (9009-22A), IBM Power System S914 (9009-41A), and IBM Power System S924 (9009-22A) servers that support IBM AIX®, IBM i, and Linux operating systems. The objective of this paper is to introduce the major innovative Power S914, Power S922, and Power 924 offerings and their relevant functions:

  • The new IBM POWER9™ processor, which is available at frequencies of 2.3 - 3.8 GHz, 2.8 - 3.8 GHz, 2.9 - 3.8 GHz, 3.4 - 3.9 GHz, 3.5 - 3.9 GHz, and 3.8 - 4.0 GHz.
  • Significantly ... [more]


cover image

IBM Power System L922 Introduction and Technical Overview
Power Systems

Draft Redpaper, last updated 21 Jun 2018

This IBM® Redpaper™ publication is a comprehensive guide covering the IBM Power System L922 (9008-22L) server designed from the ground up for data-intensive workloads like databases and analytics in Linux operating system. The objective of this paper is to introduce the major innovative Power L922 offering and its relevant functions:

  • The new IBM POWER9™ processor, available at frequencies of 2.7 to 3.8 GHz, 2.9 to 3.8 GHz, 3.4 to 3.9 GHz
  • Significantly strengthened cores and larger caches
  • Two integrated memory controllers which allow doubled the memory footprint ... [more]


cover image

Security on IBM z/VSE
z Systems

Redbooks, published 14 Jun 2018

One of a firm’s most valuable resources is its data: client lists, accounting data, employee information, and so on. This critical data must be securely managed and controlled, and simultaneously made available to those users authorized to see it. The IBM® z/VSE® system features extensive capabilities to simultaneously share the firm’s data among multiple users and protect them. Threats to this data come from various sources. Insider threats and malicious hackers are not only difficult to detect and prevent, they might be using resources with the business being unaware. This IBM Redbooks® ... [more]


cover image

Getting Started with z/OS Data Set Encryption
z Systems

Redbooks, published 5 Jun 2018, last updated 13 Jun 2018

This IBM® Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment. In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments. This publication is intended for IT architects, system programmer, and security administrators ... [more]


cover image

IBM Z Integration Guide for the Hybrid Cloud and API Economy
Mobile

Draft Redpaper, last updated 12 Jun 2018

Today, organizations are responding to market demands and regulatory requirements faster than ever by extending their applications and data to new digital applications. This drive to deliver new functions at speed has paved the way for a huge growth in cloud and microservices applications, such as those hosted in IBM® Cloud. One of the most widely adopted ways to integrate cloud applications with enterprise application logic and business data is the use of application programming interfaces (APIs). By extending enterprise applications to form a hybrid cloud environment, you can capitalize on ... [more]


Announcing IBM Redbooks Badges
Redbooks mobile app

IBM Redbooks want technical practitioners to be recognized for their newly gained knowledge, experience and accomplishments.

Become an IBM certified Redbooks author

Follow IBM Redbooks

Follow IBM Redbooks